Search Results for Data protection. - Narrowed by: SpringerLink (Online service) - Computers -- Law and legislation. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dData$002bprotection.$0026qf$003dAUTHOR$002509Author$002509SpringerLink$002b$002528Online$002bservice$002529$002509SpringerLink$002b$002528Online$002bservice$002529$0026qf$003dSUBJECT$002509Subject$002509Computers$002b--$002bLaw$002band$002blegislation.$002509Computers$002b--$002bLaw$002band$002blegislation.$0026ps$003d300$0026isd$003dtrue? 2024-09-02T08:12:40Z European Data Protection: In Good Health? ent://SD_ILS/0/SD_ILS:206493 2024-09-02T08:12:40Z 2024-09-02T08:12:40Z Author&#160;Gutwirth, Serge. editor.&#160;Leenes, Ronald. editor.&#160;De Hert, Paul. editor.&#160;Poullet, Yves. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-2903-2">http://dx.doi.org/10.1007/978-94-007-2903-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Market Integration Through Data Protection An Analysis of the Insurance and Financial Industries in the EU ent://SD_ILS/0/SD_ILS:336155 2024-09-02T08:12:40Z 2024-09-02T08:12:40Z Author&#160;Viola de Azevedo Cunha, Mario. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(336155.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-6085-1">http://dx.doi.org/10.1007/978-94-007-6085-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Beyond Data Protection Strategic Case Studies and Practical Guidance ent://SD_ILS/0/SD_ILS:333660 2024-09-02T08:12:40Z 2024-09-02T08:12:40Z Author&#160;Ismail, Noriswadi. editor.&#160;Yong Cieh, Edwin Lee. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(333660.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33081-0">http://dx.doi.org/10.1007/978-3-642-33081-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Privacy and Data Protection Issues of Biometric Applications A Comparative Legal Analysis ent://SD_ILS/0/SD_ILS:336365 2024-09-02T08:12:40Z 2024-09-02T08:12:40Z Author&#160;Kindt, Els J. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(336365.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-94-007-7522-0">http://dx.doi.org/10.1007/978-94-007-7522-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection XII 12th IFIP WG 11.10 International Conference, ICCIP 2018, Arlington, VA, USA, March 12-14, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:400126 2024-09-02T08:12:40Z 2024-09-02T08:12:40Z Author&#160;Staggs, Jason. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-04537-1">https://doi.org/10.1007/978-3-030-04537-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Forensics and Cyber Crime 9th International Conference, ICDF2C 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings ent://SD_ILS/0/SD_ILS:401948 2024-09-02T08:12:40Z 2024-09-02T08:12:40Z Author&#160;Matou&scaron;ek, Petr. editor.&#160;Schmiedecker, Martin. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-73697-6">https://doi.org/10.1007/978-3-319-73697-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security Protocols XVII 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers ent://SD_ILS/0/SD_ILS:334145 2024-09-02T08:12:40Z 2024-09-02T08:12:40Z Author&#160;Christianson, Bruce. editor.&#160;Malcolm, James A. editor.&#160;Maty&aacute;&scaron;, Vashek. editor.&#160;Roe, Michael. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(334145.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-36213-2">http://dx.doi.org/10.1007/978-3-642-36213-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection VII 7th IFIP WG 11.10 International Conference, ICCIP 2013, Washington, DC, USA, March 18-20, 2013, Revised Selected Papers ent://SD_ILS/0/SD_ILS:335209 2024-09-02T08:12:40Z 2024-09-02T08:12:40Z Author&#160;Butts, Jonathan. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE(335209.1)<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-45330-4">http://dx.doi.org/10.1007/978-3-642-45330-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Future Security 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4-6, 2012. Proceedings ent://SD_ILS/0/SD_ILS:197328 2024-09-02T08:12:40Z 2024-09-02T08:12:40Z Author&#160;Aschenbruck, Nils. editor.&#160;Martini, Peter. editor.&#160;Meier, Michael. editor.&#160;T&ouml;lle, Jens. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-33161-9">http://dx.doi.org/10.1007/978-3-642-33161-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Protection VI 6th IFIP WG 11.10 International Conference, ICCIP 2012, Washington, DC, USA, March 19-21, 2012, Revised Selected Papers ent://SD_ILS/0/SD_ILS:197638 2024-09-02T08:12:40Z 2024-09-02T08:12:40Z Author&#160;Butts, Jonathan. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-35764-0">http://dx.doi.org/10.1007/978-3-642-35764-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Software Similarity and Classification ent://SD_ILS/0/SD_ILS:173499 2024-09-02T08:12:40Z 2024-09-02T08:12:40Z Author&#160;Cesare, Silvio. author.&#160;Xiang, Yang. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-1-4471-2909-7">http://dx.doi.org/10.1007/978-1-4471-2909-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Identit&auml;tsdiebstahl und Identit&auml;tsmissbrauch im Internet Rechtliche und technische Aspekte ent://SD_ILS/0/SD_ILS:193099 2024-09-02T08:12:40Z 2024-09-02T08:12:40Z Author&#160;Borges, Georg. author.&#160;Schwenk, J&ouml;rg. author.&#160;Stuckenberg, Carl-Friedrich. author.&#160;Wegener, Christoph. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-15833-9">http://dx.doi.org/10.1007/978-3-642-15833-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> I contenuti digitali tecnologie, diritti e libert&agrave; ent://SD_ILS/0/SD_ILS:204402 2024-09-02T08:12:40Z 2024-09-02T08:12:40Z Author&#160;Lucchi, Nicola. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-88-470-1399-5">http://dx.doi.org/10.1007/978-88-470-1399-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Data Privacy Management and Autonomous Spontaneous Security 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:191613 2024-09-02T08:12:40Z 2024-09-02T08:12:40Z Author&#160;Garcia-Alfaro, Joaquin. editor.&#160;Navarro-Arribas, Guillermo. editor.&#160;Cuppens-Boulahia, Nora. editor.&#160;Roudier, Yves. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-11207-2">http://dx.doi.org/10.1007/978-3-642-11207-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Future of Identity in the Information Society 4th IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised Selected Papers ent://SD_ILS/0/SD_ILS:190588 2024-09-02T08:12:40Z 2024-09-02T08:12:40Z Author&#160;Maty&aacute;&scaron;, Vashek. editor.&#160;Fischer-H&uuml;bner, Simone. editor.&#160;Cvr&#269;ek, Daniel. editor.&#160;&Scaron;venda, Petr. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-03315-5">http://dx.doi.org/10.1007/978-3-642-03315-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Information Hiding 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers ent://SD_ILS/0/SD_ILS:190946 2024-09-02T08:12:40Z 2024-09-02T08:12:40Z Author&#160;Katzenbeisser, Stefan. editor.&#160;Sadeghi, Ahmad-Reza. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-04431-1">http://dx.doi.org/10.1007/978-3-642-04431-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Protecting Persons While Protecting the People Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008. Revised Selected Papers ent://SD_ILS/0/SD_ILS:191308 2024-09-02T08:12:40Z 2024-09-02T08:12:40Z Author&#160;Gal, Cecilia S. editor.&#160;Kantor, Paul B. editor.&#160;Lesk, Michael E. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-642-10233-2">http://dx.doi.org/10.1007/978-3-642-10233-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Proceedings of The Ifip Tc 11 23rd International Information Security Conference IFIP 20th World Computer Congress, IFIP SEC&rsquo;08, September 7-10, 2008, Milano, Italy ent://SD_ILS/0/SD_ILS:164757 2024-09-02T08:12:40Z 2024-09-02T08:12:40Z Author&#160;Jajodia, Sushil. editor.&#160;Samarati, Pierangela. editor.&#160;Cimato, Stelvio. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-09699-5">http://dx.doi.org/10.1007/978-0-387-09699-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Trust Management II Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway ent://SD_ILS/0/SD_ILS:164638 2024-09-02T08:12:40Z 2024-09-02T08:12:40Z Author&#160;Karabulut, Y&uuml;cel. editor.&#160;Mitchell, John. editor.&#160;Herrmann, Peter. editor.&#160;Jensen, Christian Damsgaard. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-0-387-09428-1">http://dx.doi.org/10.1007/978-0-387-09428-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Provable Security First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007. Proceedings ent://SD_ILS/0/SD_ILS:187473 2024-09-02T08:12:40Z 2024-09-02T08:12:40Z Author&#160;Susilo, Willy. editor.&#160;Liu, Joseph K. editor.&#160;Mu, Yi. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1007/978-3-540-75670-5">http://dx.doi.org/10.1007/978-3-540-75670-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>